The perfect storm of Android threats
NFC relay attacks, pre-installed Trojans, and other nasties ruining the Android experience in 2026.
454 articles
NFC relay attacks, pre-installed Trojans, and other nasties ruining the Android experience in 2026.
Here’s how to mitigate the risks of targeted attacks on your organization’s mail servers.
We’re going bargain hunting in a new way: armed with AI. In this post: examples of effective prompts.
You’ve received a threatening email. What’s your next move?
Which messaging apps leak the least amount of your data, and provide the most control over your privacy? Today we discuss the latest rankings of popular communication platforms.
Attackers are abusing legitimate websites to host hidden SEO links. We break down their tactics, and what you can do about it.
Artificial intelligence has given scammers a new set of tools for deception — from generating deepfakes, to instantly setting up phishing websites or fraudulent email campaigns. Let’s discuss the latest AI trends in phishing and scams — and how to stay safe.
How 5G smartphone connectivity can be compromised, and what it means for subscribers.
Brushing, quishing, and other fraud schemes that begin with the delivery by courier of a product you never ordered.
Everything you need to know about the latest Telegram scams and phishing, and how to stay safe.
We’ve uncovered a new Trojan — Efimer — which steals cryptocurrency via the clipboard. Here’s how it functions, and how you can stay protected.
Don’t panic. Again, don’t panic. Did we say don’t panic? A common threat explained in simple terms.
Scammers are tricking people into giving up cryptocurrency through Google Forms surveys. Here is what they are doing and how to avoid falling victim to this scam.
A curious case of spear-phishing email techniques employed on a mass scale.
Scammers have figured out how to send text messages that actually bypass cellular networks. How does illicit “SMS blasting” work, why does it matter for travelers, and how to stay safe.
A popular password manager was modified to allow attackers to steal passwords and encrypt users’ data. How to protect home computers and corporate systems from this threat?
Planning a safe digital detox: a checklist to help prepare for a vacation and unwind in peace.
This report delves into the cyberthreat landscape that has exploited Gen Z’s favorite streaming services, films, series and anime from Q2 2024 to Q1 2025, highlighting the related dangers and providing insights on how to protect yourself from these threats.
A dozen short and simple tips on how to use WhatsApp, Telegram, Signal, iMessage, WeChat, and other messaging apps safely and hassle-free.
Archives are being used in targeted phishing and other attacks on organizations. What tools, settings, and policies can mitigate the threat?
Scammers are exploiting GetShared to bypass email security.